Researchers recently observed that cyber criminals using a weaponized memes in order to communicate with malware for various malicious operations.
Memes are nowadays using for fast communication methods to spreading news which is now abused by cyber criminals to reach victims in a very effective way.
Attackers using Steganography to embed the malicious payload inside of the image to bypass the security solutions to compromise vicitms.
Similarly last year, attackers using 2 memes that was posted in twitter that contain embedded link which point to the command & control server where malware dropped into victims system.
Currently observed campaign being delivered via legitimate service, a popular social media service where attackers posted a meme that looks like very benign.
Initially, once users infected by malware which download malicious memes from Twitter account to the victim’s machine
Further analysis reveals that the memes contain a “/print” command hidden inside that will be extracted and helps malware to take a screenshot of the infected victim’s machine.
The later moment it communicates with Command & control server from pastebin and send the collected screenshots of the victim’s machine.
Also, researcher observed that Pastebin URL points to an internal or private IP address, which is possibly a temporary placeholder used by the attackers.
Attackers parse the malicious memes from the twitter account where the file posted using a specific pattern.
“<img src=\”(.*?):thumb\” width=\”.*?\” height=\”.*?\”/>”
According to Trend Micro, There where 2 memes were posted which contains a command that helps malware to perform various malicious operation such as capture screenshots, collect system information, among others.
Following commands used by malware to retrieve the information from the infected machine.
Commands | Description |
Screen capture | |
/processos | Retrieve list of running processes |
/clip | Capture clipboard content |
/username | Retrieve username from infected machine |
/docs | Retrieve filenames from a predefined path such as (desktop, %AppData% etc.) |
Indicators of Compromise
Hashes (SHA-256)
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
Powerful Mobile Malware Rotexy Launched over 70,000 Attacks with Banking Trojan & Ransomware Modules
$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…